From 5d55f101774bb5bb25ced522bdb9e07b1f959269 Mon Sep 17 00:00:00 2001 From: Diavolo Date: Tue, 11 May 2021 10:02:13 +0200 Subject: [PATCH] Readme --- README.md | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index f0c5089..328dbe9 100644 --- a/README.md +++ b/README.md @@ -11,4 +11,17 @@ The exploit has since been mitigated, but the underlying bug in the client remai ## How does this work? -The exploit works by modifying the server name with a malicious string of characters. It will make any client crash. \ No newline at end of file +The exploit works by modifying the server name with a malicious string of characters. It will make any client crash. + +## Compile from source + +- Clone the Git repo. Do NOT download it as ZIP, that won't work. +- Run `premake5 vs2019` or simply use the delivered `generate.bat`. +- Build via solution file in `build\server-list-exploit.sln`. + +## Premake arguments + +| Argument | Description | +|:----------------------------|:-----------------------------------------------| +| `--dev-build` | Do nothing. | +| `--copy-to` | Copy the EXE to a custom folder after build. |